A survey of fault attacks in pairing based cryptography

被引:16
|
作者
El Mrabet, Nadia [1 ]
Fournier, Jacques J. A. [2 ]
Goubin, Louis [3 ]
Lashermes, Ronan [2 ,3 ]
机构
[1] Univ Paris 08, LIASD, St Denis, France
[2] CEA TechReg, Gardanne, France
[3] UVSQ, PRiSM, Versailles, France
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2015年 / 7卷 / 01期
关键词
Pairing based cryptography; Miller's algorithm; Fault attacks; SIDE CHANNEL ATTACKS; FINAL EXPONENTIATION; IMPLEMENTATIONS; ENCRYPTION;
D O I
10.1007/s12095-014-0114-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography. These make the use of pairings suitable for small and constrained devices (smart phones, smart cards ...) in addition to more powerful platforms. As for any cryptographic algorithm which may be deployed in insecure locations, these implementations must be secure against physical attacks, and in particular fault attacks. In this paper, we present the state-of-the-art of fault attacks against pairing algorithms, more precisely fault attacks against the Miller algorithm and the final exponentiation which are the two parts of a pairing calculation.
引用
收藏
页码:185 / 205
页数:21
相关论文
共 50 条
  • [21] Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
    Shirase, Masaaki
    Miyazaki, Yukinori
    Takagi, Tsuyoshi
    Han, Dong-Guk
    Choi, Dooho
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 909 - 917
  • [22] Using Abelian Varieties to Improve Pairing-Based Cryptography
    K. Rubin
    A. Silverberg
    Journal of Cryptology, 2009, 22 : 330 - 364
  • [23] A Survey of Chaos-based Cryptography
    Zhen, Ping
    Zhao, Geng
    Min, Lequan
    Li, Xiaodong
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 237 - 244
  • [24] Securing Information Exchange in VANETs by Using Pairing-Based Cryptography
    Chen, Chin-Ling
    Shin, Jungpil
    Tsai, Yu-Ting
    Castiglione, Aniello
    Palmieri, Francesco
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 781 - 797
  • [25] Neural Networks-Based Cryptography: A Survey
    Meraouche, Ishak
    Dutta, Sabyasachi
    Tan, Haowen
    Sakurai, Kouichi
    IEEE ACCESS, 2021, 9 : 124727 - 124740
  • [26] An efficient implementation of pairing-based cryptography on MSP430 processor
    Kwon, Jihoon
    Seo, Seog Chung
    Hong, Seokhie
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03) : 1394 - 1417
  • [27] Lightweight Cryptography and DPA Countermeasures: A Survey
    Moradi, Amir
    Poschmann, Axel
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 68 - +
  • [28] On the Duality of Probing and Fault Attacks
    Berndt M. Gammel
    Stefan Mangard
    Journal of Electronic Testing, 2010, 26 : 483 - 493
  • [29] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [30] An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 1394 - 1417